Hellman

Results: 440



#Item
211

Diffie-Hellman-Algorithmus Schlüsselaustausch Um einen Klartext zu verschlüsseln, und auch anschließend zu entschlüsseln, brauchen Sender und Empfänger denselben Schlüssel. Dieser ist meist eine Zahl. Sender und Em

Add to Reading List

Source URL: ddi.uni-wuppertal.de

Language: German - Date: 2012-06-01 05:59:41
    212Nuclear strategies / International security / Nuclear weapons / Soviet Union–United States relations / Cold War / Mutual assured destruction / Cuban Missile Crisis / Deterrence theory / Able Archer 83 / International relations / Military science / Nuclear warfare

    Soaring, Cryptography and Nuclear Weapons Martin E. Hellman Professor Emeritus of Electrical Engineering Stanford University Section 1: 99.9% Safe Maneuvers Letʼs face it, nuclear weapons are the elephant in the room th

    Add to Reading List

    Source URL: www.nuclearrisk.org

    Language: English - Date: 2008-10-21 17:26:31
    213Key management / Group key / RSA / Cryptographic protocols / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Key distribution

    PDF Document

    Add to Reading List

    Source URL: www.cs.cornell.edu

    Language: English - Date: 2013-08-27 16:22:38
    214Computer security / XTR / Key size / Group key / Diffie–Hellman key exchange / Key distribution / Security / Key management / Cyberwarfare / Key distribution center

    A Scalable Method for Access Control in Location-Based Broadcast Services Mudhakar Srivatsa† , Arun Iyengar† , Jian Yin‡ and Ling Liu‡ IBM T.J. Watson Research Center† College of Computing, Georgia Tech†

    Add to Reading List

    Source URL: www.cc.gatech.edu

    Language: English - Date: 2008-03-08 00:23:57
    215Elliptic curve cryptography / Cryptographic protocols / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key / MQV / Digital signature / Cryptographic Message Syntax / NSA Suite B Cryptography / Cryptography / Public-key cryptography / Key management

    Network Working Group Request for Comments: 3278 Category: Informational S. Blake-Wilson D. Brown

    Add to Reading List

    Source URL: www.rfc-editor.org

    Language: English - Date: 2002-05-09 20:29:36
    216

    Diffie-Hellman-Algorithmus Arbeitsblatt Aufgabe Schlüsselaustausch

    Add to Reading List

    Source URL: ddi.uni-wuppertal.de

    Language: German - Date: 2012-04-12 12:34:50
      217

      2002 Paper 1 Question 7 Discrete Mathematics State Fermat’s Little Theorem and derive the Diffie–Hellman protocol for key exchange. [6 marks]

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      - Date: 2014-06-09 10:17:46
        218

        Jan Hellman Photography Jan Hellman Photography Advertising Architecture

        Add to Reading List

        Source URL: www.sbf.ch

        - Date: 2014-01-16 14:42:16
          219Onion routing / Tor / Public-key cryptography / Routing / Diffie–Hellman key exchange / Anonymizer / Crypto-anarchism / Cryptography / Internet privacy / Internet

          NOVALUG: 10 April 2010 Tor: A distributed anonymization system ● What it is

          Add to Reading List

          Source URL: drwho.virtadpt.net

          Language: English - Date: 2010-04-10 16:36:08
          220Digital signature / Diffie–Hellman problem / Signcryption / Group signature / Blind signature / ID-based encryption / RSA / Pairing / Diffie–Hellman key exchange / Cryptography / BLS / Decisional Diffie–Hellman assumption

          Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2004-06-24 08:19:14
          UPDATE